References of "Scientific journals"
     in
Bookmark and Share    
Full Text
Peer Reviewed
See detailIntelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges
Khan, Wali Ullah UL; Javed, Muhammad Awais; Zeadally, Sherali et al

in IEEE Communications standards Magazine (2022)

Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting ... [more ▼]

Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt to the wireless environment, their combination with reconfigurable surfaces and deep learning approaches can open new avenues for achieving secure 6G vehicular aided heterogeneous networks (HetNets). Motivated by these appealing advantages, this work provides an intelligent and secure radio environment (ISRE) paradigm for 6G vehicular aided HetNets. We present an overview of enabling technologies for ISRE-based 6G vehicular aided HetNets. We discuss features, design goals, and applications of such networks. Next, we outline new opportunities provided by ISRE-based 6G vehicular HetNets and we present a case study using the contextual bandit approach in terms of best IRS for secure communications. Finally, we discuss some future research opportunities. [less ▲]

Detailed reference viewed: 15 (0 UL)
Full Text
Peer Reviewed
See detailBehind the last line of defense: Surviving SoC faults and intrusions
Pinto-Gouveia, Ines; Volp, Marcus UL; Esteves-Verissimo, Paulo

in Computers & Security (2022), 123

Today, leveraging the enormous modular power, diversity and flexibility of manycore systems-on-a-chip (SoCs) requires careful orchestration of complex and heterogeneous resources, a task left to low-level ... [more ▼]

Today, leveraging the enormous modular power, diversity and flexibility of manycore systems-on-a-chip (SoCs) requires careful orchestration of complex and heterogeneous resources, a task left to low-level software, e.g., hypervisors. In current architectures, this software forms a single point of failure and worthwhile target for attacks: once compromised, adversaries can gain access to all information and full control over the platform and the environment it controls. This article proposes Midir, an enhanced manycore architecture, effecting a paradigm shift from SoCs to distributed SoCs. Midir changes the way platform resources are controlled, by retrofitting tile-based fault containment through well known mechanisms, while securing low-overhead quorum-based consensus on all critical operations, in particular privilege management and, thus, management of containment domains. Allowing versatile redundancy management, Midir promotes resilience for all software levels, including at low level. We explain this architecture, its associated algorithms and hardware mechanisms and show, for the example of a Byzantine fault tolerant microhypervisor, that it outperforms the highly efficient MinBFT by one order of magnitude. [less ▲]

Detailed reference viewed: 31 (7 UL)
Full Text
Peer Reviewed
See detailFunctional observability and subspace reconstruction in nonlinear systems
Montanari, Arthur; Freitas, Leandro; Proverbio, Daniele UL et al

in Physical Review Research (2022), 4

Time-series analysis is fundamental for modeling and predicting dynamical behaviors from time- ordered data, with applications in many disciplines such as physics, biology, finance, and engineering ... [more ▼]

Time-series analysis is fundamental for modeling and predicting dynamical behaviors from time- ordered data, with applications in many disciplines such as physics, biology, finance, and engineering. Measured time-series data, however, are often low dimensional or even univariate, thus requiring embedding methods to reconstruct the original system’s state space. The observability of a system establishes fundamental conditions under which such reconstruction is possible. However, complete observability is too restrictive in applications where reconstructing the entire state space is not necessary and only a specific subspace is relevant. Here, we establish the theoretic condition to reconstruct a nonlinear functional of state variables from measurement processes, generalizing the concept of functional observability to nonlinear systems. When the functional observability condition holds, we show how to construct a map from the embedding space to the desired functional of state variables, characterizing the quality of such reconstruction. The theoretical results are then illustrated numerically using chaotic systems with contrasting observability properties. By exploring the presence of functionally unobservable regions in embedded attractors, we also apply our theory for the early warning of seizure-like events in simulated and empirical data. The studies demonstrate that the proposed functional observability condition can be assessed a priori to guide time-series analysis and experimental design for the dynamical characterization of complex systems. [less ▲]

Detailed reference viewed: 8 (0 UL)
Full Text
Peer Reviewed
See detailCorporate Managers, Price Noise and the Investment Factor
Lehnert, Thorsten UL

in Financial Innovation (2022), 8(61),

Detailed reference viewed: 71 (12 UL)
Full Text
Peer Reviewed
See detailMagnetic neutron scattering from spherical nanoparticles with Néel surface anisotropy: atomistic simulations
Adams, Michael Philipp UL; Michels, Andreas UL; Kachkachi, Hamid

in Journal of Applied Crystallography (2022), 55(6), 1488-1499

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailPréservation et distorsion : l’espace-temps des réseaux socio-numériques et du web archivé
Clavert, Frédéric UL; Schafer, Valerie UL; Mahroug, Sophia UL

in Revue d'Histoire Culturelle (2022), (5),

Massive data, also known as Big Data - originating from websites and digital social networks, in the form of text, images, videos or metadata -, constitute significant sources for recent and future ... [more ▼]

Massive data, also known as Big Data - originating from websites and digital social networks, in the form of text, images, videos or metadata -, constitute significant sources for recent and future research in cultural history. These “digital traces”, collected by researchers or institutions, require further methodological thoughts - from their archiving to their development, in order to analyse them at different scales (scalable reading). Indeed, they allow researchers to identify new spatiotemporal boundaries, but also asymmetries and distortions between the theoretical scope of Big Data (from the millisecond to the long term, from the meter to the globe) and its practical scope (regional inequalities in collection, noise and silences within the archives). Based on several research projects and institutional initiatives, this article aims at thinking about the space-time of born-digital heritage, from the standpoint of data, collections and research, in order to grasp both the consequences of this massive archiving on the shaping of history and the profession of historian, and to identify the ongoing issues of these historical sources for academic research. [less ▲]

Detailed reference viewed: 31 (3 UL)
Full Text
Peer Reviewed
See detailStocker
Niemeyer, Katharina; Schafer, Valerie UL

in Le Temps des Médias (2022), 39

La mémoire et l’archive ont fait l’objet d’un intérêt certain et transdisciplinaire depuis quelques décennies dans le domaine des études médiatiques et de communication. Des recherches, colloques et ... [more ▼]

La mémoire et l’archive ont fait l’objet d’un intérêt certain et transdisciplinaire depuis quelques décennies dans le domaine des études médiatiques et de communication. Des recherches, colloques et publications ont vu le jour, de The Audible Past : Cultural Origins of Sound Reproduction ou Technologies of memory : Practices of remembering in analogue and digital photography à L’invention de la mémoire : Écrire, enregistrer, numériser ou plus récemment l’ouvrage en ligne Le goût de l’archive à l’ère numérique, en passant par de nombreux autres travaux. Certes, le stockage – de contenus médiatiques, d’informations, de données, de documents et d’objets, mais aussi l’usage de ces stocks médiatiques, a bénéficié d’une attention en lien avec ces préoccupations relatives à la mémoire et l’archive. Cependant il est finalement assez peu abordé pour lui-même, comme y invite au contraire ce dossier. [less ▲]

Detailed reference viewed: 17 (2 UL)
Full Text
Peer Reviewed
See detailLe CD-Rom, une histoire à graver
Schafer, Valerie UL

in Le Temps des Médias (2022), 39

This article looks back at the history of the CD-ROM in France by replacing it in the context of the development of optical disks in the 1980s-1990s. It enlightens the convergence between media and ... [more ▼]

This article looks back at the history of the CD-ROM in France by replacing it in the context of the development of optical disks in the 1980s-1990s. It enlightens the convergence between media and information technology and underlines its role as a missing link in the history of the digital, at a time of transition from Minitel to the Web. The CD-Rom has received less historiographical interest than other technological artefacts. Its multimedia character, the new forms of digital writing it induces, and the issues its use raised (piracy, copyright, etc.) remind us that the CD-Rom occupies a place in a history that goes beyond data and information storage. It also sheds light on the computerization and digitalization of both individual and professional practices in France. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailCompressive behaviour of steel-fibre reinforced concrete in Anne2605-1729x L of new Eurocode 2
Ruiz, Gonzalo; de la Rosa, Angel; Poveda, Elisa et al

in Hormigon y Acero (2022)

This paper describes the model for the compressive stress-strain behaviourof steel-fibre reinforced concrete (SFRC) in Annex L of the new Eurocode 2(CEN, Eurocode 2: Design of concrete structures. Part 1 ... [more ▼]

This paper describes the model for the compressive stress-strain behaviourof steel-fibre reinforced concrete (SFRC) in Annex L of the new Eurocode 2(CEN, Eurocode 2: Design of concrete structures. Part 1-1: General rules– Rules for buildings, bridges and civil structures, prEN 1992-1-1: 2022;EC2 in short), developed within CEN TC250/SC2/WG1/TG2 – Fiber rein-forced concrete. The model uses functions obtained from correlations withan extensive database comprised of 197 well-documented SFRC compres-sive tests and 484 flexural tests. We detailedly explain the model and derive the strain values for the parabola-rectangle model for ULS of SFRC in An-nex L. In addition, we also use the model and the correlations with thedatabase to provide a link between the compressive and the flexural perfor-mance classes in EC2, which allows a complete definition of any particularSFRC. Likewise, we derive parabola-rectangle strain values for each flexuralperformance class, which is mainly advantageous for the stronger flexuralperformance classes. Finally, we give an example showing the enhancementin strength and ductility of a composite steel-SFRC section endorsed withthe new model, which results of 15% and 100%, respectively. [less ▲]

Detailed reference viewed: 27 (3 UL)
Full Text
Peer Reviewed
See detailBetween marginal and mainstream. Communities and ecosystems at stake
Clavert, Frédéric UL; Schafer, Valerie UL

in Internet Histories: Digital Technology, Culture and Society (2022)

The three research articles in this special issue and the interview with Ronda Hauben are partly the result of the 4th RESAW conference, that brought together through the RESAW network a community of ... [more ▼]

The three research articles in this special issue and the interview with Ronda Hauben are partly the result of the 4th RESAW conference, that brought together through the RESAW network a community of researchers, web archivists and professionals, united around a common interest, namely web history and web archives. The 4th RESAW conference, organised on 17 and 18 June 2021 by the C2DH (Centre for contemporary and digital history) at the University of Luxembourg, sought to examine the tension between marginal and mainstream in web history, and to go beyond this binary view. The aim was to study all the nuances, shifts in meaning, difficulties in defining and measuring audiences, as well as the evolution over the course of history of digital practices, content, producers, and communities, from the fringes and peripheries to the centre and the core of the Web. The RESAW conference was also an opportunity to launch the HIVI research project , hosted at the C2DH, and the topics that were addressed at the conference were also related to virality. [less ▲]

Detailed reference viewed: 25 (5 UL)
Full Text
Peer Reviewed
See detailHigh Altitude Platform Stations Aided Cloud-Computing Solution for Rural-Environment IoT Applications
Monzon Baeza, Victor UL; Alvarez Marban, Manuel

in Frontiers in Communications and Networks (2022)

This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an ... [more ▼]

This work proposes a flexible and scalable Smart Rural (SR) system for gathering and processing IoT data from remote rural areas with no traditional communication coverage as a handicap. We offer an architecture structured in distinct segments using emerging technologies such as IoT, 5G, Cloud and High Altitude Platform Station (HAPS). This proposal is applied to the rural environment to cover thus all the needs of the system in the collection of IoT data from these remote rural areas, its coverage by space vehicles and its processing and storage through 5G terrestrial networks and cloud services. The proposal includes the deployment of IoT sensors and the development of Amazon Web Services (AWS). On the other hand, the part of the space segment considered by HAPS has been simulated for different space channels. This way offers a complete and automated SR system that allows access to these IoT data from remote rural areas through the Internet. [less ▲]

Detailed reference viewed: 38 (9 UL)
Full Text
Peer Reviewed
See detailCormenin et l’hystérisation de la joute parlementaire sous la monarchie de Juillet
Saintes, Laetitia UL

in Savoirs en lien (2022), 1

Under the July Monarchy, parliamentary debate was marked by the sometimes unheard-of verbal violence of the exchanges that Louis de Cormenin, MP and pamphleteer, described in his Livre des orateurs (1836 ... [more ▼]

Under the July Monarchy, parliamentary debate was marked by the sometimes unheard-of verbal violence of the exchanges that Louis de Cormenin, MP and pamphleteer, described in his Livre des orateurs (1836). In the face of this hysterisation of parliamentary debate, did Cormenin plead for moderation? Did he advocate a debate that allowed room for verbal violence against the immobilism of ministerial policy? Or did he call for a middle way? This contribution seeks to answer this question in the light of the Livre des orateurs and the Lettres sur la liste civile. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailDemystifying Hidden Sensitive Operations in Android apps
Sun, Xiaoyu; Chen, Xiao; Li, Li et al

in ACM Transactions on Software Engineering and Methodology (2022)

Detailed reference viewed: 19 (1 UL)
Full Text
Peer Reviewed
See detailUnsupervised network embedding beyond homophily
Zhong, Zhiqiang; Gonzalez, Guadalupe; Grattarola, Daniele et al

in Transactions on Machine Learning Research (2022)

Detailed reference viewed: 17 (1 UL)
See detailDie inoffizielle Version. Besprechung von Dogan Akhanlis "Medea 38/Stimmen" am Schauspielhaus Bonn
Bloch, Natalie UL

in Theater heute (2022), 63(12), 59-60

Detailed reference viewed: 26 (0 UL)
Full Text
Peer Reviewed
See detailSpace-Terrestrial Cooperation Over Spatially Correlated Channels Relying on Imperfect Channel Estimates: Uplink Performance Analysis and Optimization
Chien, Trinh Van; Lagunas, Eva UL; Hoang, Tiep M. et al

in IEEE Transactions on Communications (2022)

Detailed reference viewed: 18 (1 UL)
Full Text
Peer Reviewed
See detail5G Vehicle-to-Everything at the Cross-Borders: Security Challenges and Opportunities
Boualouache, Abdelwahab UL; Brik, Bouziane; Tang, Qiang et al

in IEEE Internet of Things Journal (2022)

5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G ... [more ▼]

5G Vehicle-to-Everything (5G-V2X) communications will play a vital role in the development of the automotive industry. Indeed and thanks to the Network Slicing (NS) concept of 5G and beyond networks (B5G), unprecedented new vehicular use–cases can be supported on top of the same physical network. NS promises to enable the sharing of common network infrastructure and resources while ensuring strict traffic isolation and providing necessary network resources to each NS. However, enabling NS in vehicular networks brings new security challenges and requirements that automotive or 5G standards have not yet addressed. Attackers can exploit the weakest link in the slicing chain, connected and automated vehicles, to violate the slice isolation and degrade its performance. Furthermore, these attacks can be more powerful, especially if they are produced in cross-border areas of two countries, which require an optimal network transition from one operator to another. Therefore, this article aims to provide an overview of newly enabled 5G-V2X slicing use cases and their security issues while focusing on cross-border slicing attacks. It also presents the open security issues of 5G-V2X slicing and identifies some opportunities. [less ▲]

Detailed reference viewed: 69 (14 UL)
Full Text
Peer Reviewed
See detailA Survey on Machine Learning-based Misbehavior Detection Systems for 5G and Beyond Vehicular Networks
Boualouache, Abdelwahab UL; Engel, Thomas UL

in IEEE Communications Surveys and Tutorials (2022)

Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable ... [more ▼]

Advances in Vehicle-to-Everything (V2X) technology and onboard sensors have significantly accelerated deploying Connected and Automated Vehicles (CAVs). Integrating V2X with 5G has enabled Ultra-Reliable Low Latency Communications (URLLC) to CAVs. However, while communication performance has been enhanced, security and privacy issues have increased. Attacks have become more aggressive, and attackers have become more strategic. Public Key Infrastructure (PKI) proposed by standardization bodies cannot solely defend against these attacks. Thus, in complementary of that, sophisticated systems should be designed to detect such attacks and attackers. Machine Learning (ML) has recently emerged as a key enabler to secure future roads. Various V2X Misbehavior Detection Systems (MDSs) have adopted this paradigm. However, analyzing these systems is a research gap, and developing effective ML-based MDSs is still an open issue. To this end, this paper comprehensively surveys and classifies ML-based MDSs as well as discusses and analyses them from security and ML perspectives. It also provides some learned lessons and recommendations for guiding the development, validation, and deployment of ML-based MDSs. Finally, this paper highlighted open research and standardization issues with some future directions. [less ▲]

Detailed reference viewed: 17 (13 UL)
Full Text
Peer Reviewed
See detailAssessing the opportunity of combining state-of-the-art Android malware detectors
Daoudi, Nadia UL; Allix, Kévin; Bissyande, Tegawendé François D Assise UL et al

in Empirical Software Engineering (2022), 28

Research on Android malware detection based on Machine learning has been prolific in recent years. In this paper, we show, through a large-scale evaluation of four state-of-the-art approaches that their ... [more ▼]

Research on Android malware detection based on Machine learning has been prolific in recent years. In this paper, we show, through a large-scale evaluation of four state-of-the-art approaches that their achieved performance fluctuates when applied to different datasets. Combining existing approaches appears as an appealing method to stabilise performance. We therefore proceed to empirically investigate the effect of such combinations on the overall detection performance. In our study, we evaluated 22 methods to combine feature sets or predictions from the state-of-the-art approaches. Our results showed that no method has significantly enhanced the detection performance reported by the state-of-the-art malware detectors. Nevertheless, the performance achieved is on par with the best individual classifiers for all settings. Overall, we conduct extensive experiments on the opportunity to combine state-of-the-art detectors. Our main conclusion is that combining state-of-theart malware detectors leads to a stabilisation of the detection performance, and a research agenda on how they should be combined effectively is required to boost malware detection. All artefacts of our large-scale study (i.e., the dataset of ∼0.5 million apks and all extracted features) are made available for replicability. [less ▲]

Detailed reference viewed: 26 (3 UL)
Full Text
Peer Reviewed
See detailCrex: Predicting patch correctness in automated repair of C programs through transfer learning of execution semantics
Yan, Dapeng; Liu, Kui; Niu, Yuqing et al

in Information and Software Technology (2022), 152

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailChalcopyrite solar cells - state-of-the-art and options for improvement
Siebentritt, Susanne UL; Weiss, Thomas UL

in Science China: Physics, Mechanics and Astronomy (2022)

Detailed reference viewed: 36 (1 UL)
Full Text
Peer Reviewed
See detailscFASTCORMICS: A Contextualization Algorithm to Reconstruct Metabolic Multi-Cell Population Models from Single-Cell RNAseq Data
Pires Pacheco, Maria Irene UL; Ji, Jimmy; Prohaska, Tessy et al

in Metabolites (2022)

Tumours are composed of various cancer cell populations with different mutation profiles, phenotypes and metabolism that cause them to react to drugs in diverse manners. Increasing the resolution of ... [more ▼]

Tumours are composed of various cancer cell populations with different mutation profiles, phenotypes and metabolism that cause them to react to drugs in diverse manners. Increasing the resolution of metabolic models based on single-cell expression data will provide deeper insight into such metabolic differences and improve the predictive power of the models. scFASTCORMICS is a network contextualization algorithm that builds multi-cell population genome-scale models from single-cell RNAseq data. The models contain a subnetwork for each cell population in a tumour, allowing to capture metabolic variations between these clusters. The subnetworks are connected by a union compartment that permits to simulate metabolite exchanges between cell populations in the microenvironment. scFASTCORMICS uses Pareto optimization to simultaneously maximise the compactness, completeness and specificity of the reconstructed metabolic models. scFASTCORMICS is implemented in MATLAB and requires the installation of the COBRA toolbox, rFASTCORMICS and the IBM CPLEX solver. [less ▲]

Detailed reference viewed: 44 (4 UL)
Full Text
Peer Reviewed
See detailAttractor landscapes: a unifying conceptual model for understanding behaviour change across scales of observation
Heino, Matti; Proverbio, Daniele UL; Marchand, Gwen et al

in Health Psychology Review (2022)

Models and theories in behaviour change science are not in short supply, but they almost exclusively pertain to a particular facet of behaviour, such as automaticity or reasoned action, or to a single ... [more ▼]

Models and theories in behaviour change science are not in short supply, but they almost exclusively pertain to a particular facet of behaviour, such as automaticity or reasoned action, or to a single scale of observation such as individuals or communities. We present a highly generalisable conceptual model which is widely used in complex systems research from biology to physics, in an accessible form to behavioural scientists. The proposed model of attractor landscapes can be used to understand human behaviour change on different levels, from individuals to dyads, groups and societies. We use the model as a tool to present neglected ideas in contemporary behaviour change science, such as hysteresis and nonlinearity. The model of attractor landscapes can deepen understanding of well-known features of behaviour change (research), including short-livedness of intervention effects, problematicity of focusing on behavioural initiation while neglecting behavioural maintenance, continuum and stage models of behaviour change understood within a single accommodating framework, and the concept of resilience. We also demonstrate potential methods of analysis and outline avenues for future research. [less ▲]

Detailed reference viewed: 17 (0 UL)
Full Text
Peer Reviewed
See detailInternet histories second early career researcher award
Milligan, Ian; Brügger, Niels; Goggin, Gerard et al

in Internet Histories: Digital Technology, Culture and Society (2022)

This special issue is the result of our second call for the Internet Histories Early Career Researcher Award. For the second time, in 2021, the journal Internet Histories has invited any interested early ... [more ▼]

This special issue is the result of our second call for the Internet Histories Early Career Researcher Award. For the second time, in 2021, the journal Internet Histories has invited any interested early career researchers (masters students, doctoral students, and post-doctoral researchers) whose research focuses on the history of the Internet and/or the Web, and histories of digital cultures — or any historical topic within the scope of the Internet Histories journal, to apply for the award and to submit an original article. [less ▲]

Detailed reference viewed: 37 (2 UL)
Full Text
Peer Reviewed
See detailQuantum friction between metals in the hydrodynamic regime
Wu, Kunmin UL; Schmidt, Thomas UL; Farias, Maria Belen UL

in Physical Review. A. (2022), 106

We study the phenomenon of quantum friction in a system consisting of a polarizable atom moving at a constant speed parallel to a metallic plate. The metal is described using a charged hydrodynamic model ... [more ▼]

We study the phenomenon of quantum friction in a system consisting of a polarizable atom moving at a constant speed parallel to a metallic plate. The metal is described using a charged hydrodynamic model for the electrons. This model featuring long-range interactions is appropriate for a clean metal in a temperature range where scattering due to Coulomb interactions dominates over the scattering of electron by impurities. We find that a quantum friction force between the atom and the metal surface exists even in the absence of intrinsic damping in the metal, but that it only starts once the velocity of the atom exceeds the effective speed of sound in the metal. We argue that this condition can be fulfilled most easily in metals with nearly empty or nearly filled bands. We make quantitative predictions for the friction force to the second and fourth order in the atomic polarizability, and show that the threshold behavior persists to all orders of the perturbation theory. [less ▲]

Detailed reference viewed: 46 (14 UL)
Full Text
Peer Reviewed
See detailThe multi-scale analysis of dynamic transmission volatility of carbon prices
Nsouadi, Ange; Terraza, Virginie UL

in Economics Bulletin (2022)

The implementation of the EU ETS in 2005 led to the establishment of a price that enables manufacturers to realize the impact of their activities on the environment clean. There are no items this day ... [more ▼]

The implementation of the EU ETS in 2005 led to the establishment of a price that enables manufacturers to realize the impact of their activities on the environment clean. There are no items this day, since the creation of the European carbon market, which has focused on analyzing volatility transmission between different investment horizons. The purpose of this paper is to fill this gap in the literature. we analyze the volatility of the price of carbon quota (EUA), by studying linear and nonlinear causal relationships of wavelet components between the different volatilities we captured at different time scales. we initially decomposed the EUA price volatility at different time-frequency intervals using a wavelet approach. Our study will be to examine whether the volatility is transmitted from the high-frequency structure of the carbon price in the low frequency. Our results show an intra-structural dependence on carbon price volatility. We detect instability in the volatility of carbon and observe the existence of a bidirectional relationship from high-frequency traders to low-frequency traders. Our study showed that high-frequency shocks yield carbon price can have a significant impact beyond their Frontiers and touch the low-frequency structure associated with long-term traders Keywords: Carbon market, EU ETS, Wavelet, time-scale, Granger Causality. [less ▲]

Detailed reference viewed: 131 (6 UL)
Full Text
Peer Reviewed
See detailA Learning Based Framework for Enhancing Physical Layer Security in Cooperative D2D Network
Ahmad, Noman; Sardar Sidhu, Guftaar Ahmad; Khan, Wali Ullah UL

in Electronics (2022)

Next-generation wireless communication networks demand high spectrum efficiency to serve the requirements of an enormous number of devices over a limited available frequency spectrum. Device-to-device ... [more ▼]

Next-generation wireless communication networks demand high spectrum efficiency to serve the requirements of an enormous number of devices over a limited available frequency spectrum. Device-to-device (D2D) communication with spectrum reuse offers a potential solution to spectrum scarcity. On the other hand, non-orthogonal multiple access (NOMA) as a multiple-access approach has emerged as a key technology to re-use a spectrum among multiple users. A cellular users (CUs) can share their spectrum with D2D users (DUs) and in response, the D2D network can help relay the CU signal to achieve better secrecy from an eavesdropper. Power optimization is known to be a promising technique to enhance system performance in challenging communication environments. This work aimed to enhance the secrecy rate of the CUs where the D2D transmitter (DT) helps in relaying the CU’s message under the amplify and forward (AF) protocol. A power optimization problem is considered under the quality of service constraints in terms of minimum rate requirements at the receivers and maximum power budgets at the transmitters. The problem is a non-convex complex optimization. A deep learning-based solution is proposed and promising results are obtained in terms of the secrecy rate of CU and the rate of D2D users. [less ▲]

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailVirtual Network Embedding for NGSO Systems: Algorithmic Solution and SDN-Testbed Validation
Minardi, Mario UL; Vu, Thang Xuan UL; Lei, Lei UL et al

in IEEE Transactions on Network and Service Management (2022)

Detailed reference viewed: 18 (4 UL)
Full Text
Peer Reviewed
See detailVisual SLAM: What Are the Current Trends and What to Expect?
Tourani, Ali UL; Bavle, Hriday UL; Sanchez Lopez, Jose Luis UL et al

in Sensors (2022), 22(23), 9297

In recent years, Simultaneous Localization and Mapping (SLAM) systems have shown significant performance, accuracy, and efficiency gain. In this regard, Visual Simultaneous Localization and Mapping (VSLAM ... [more ▼]

In recent years, Simultaneous Localization and Mapping (SLAM) systems have shown significant performance, accuracy, and efficiency gain. In this regard, Visual Simultaneous Localization and Mapping (VSLAM) methods refer to the SLAM approaches that employ cameras for pose estimation and map reconstruction and are preferred over Light Detection And Ranging (LiDAR)-based methods due to their lighter weight, lower acquisition costs, and richer environment representation. Hence, several VSLAM approaches have evolved using different camera types (e.g., monocular or stereo), and have been tested on various datasets (e.g., Technische Universität München (TUM) RGB-D or European Robotics Challenge (EuRoC)) and in different conditions (i.e., indoors and outdoors), and employ multiple methodologies to have a better understanding of their surroundings. The mentioned variations have made this topic popular for researchers and have resulted in various methods. In this regard, the primary intent of this paper is to assimilate the wide range of works in VSLAM and present their recent advances, along with discussing the existing challenges and trends. This survey is worthwhile to give a big picture of the current focuses in robotics and VSLAM fields based on the concentrated resolutions and objectives of the state-of-the-art. This paper provides an in-depth literature survey of fifty impactful articles published in the VSLAMs domain. The mentioned manuscripts have been classified by different characteristics, including the novelty domain, objectives, employed algorithms, and semantic level. The paper also discusses the current trends and contemporary directions of VSLAM techniques that may help researchers investigate them. [less ▲]

Detailed reference viewed: 36 (4 UL)
Full Text
Peer Reviewed
See detailOn the use of sì? (‘yes?’) as invariant follow-up in Italian: A historical corpus-based account of pragmatic language change
Viola, Lorella UL

in Journal of Historical Pragmatics (2022)

Follow-ups are elliptical interrogative forms typically constituting an utterance in their own right. They are used to signal attention to the interlocutor, to encourage them to continue or as a reply to ... [more ▼]

Follow-ups are elliptical interrogative forms typically constituting an utterance in their own right. They are used to signal attention to the interlocutor, to encourage them to continue or as a reply to a call. This paper investigates the invariant follow-up sì? (‘yes?’) in Italian and it argues that it represents a case of pragmatic language change. To this end, it investigates the diachronic distribution, collocation and contexts of usage of sì? in a variety of language sources in relation to plausible, equivalent expressions (i.e., dimmi and dica [‘tell me’]). The analysis will show that since its earliest record of use in films in 1960, the frequency of occurrence of this form has dramatically increased to the point that, today, it is the preferred device. The study will also provide solid evidence of positive correlations between the use of yes? in English language audio-visual products and the use of sì? in scripted and real-use Italian, strongly suggesting that the marker would in fact be a case of pragmatic borrowing from English. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailProvisional Measures and the Risk of Patent Invalidity – “Phoenix Contact” and the German Approach to Interlocutory Injunctions
Stierle, Martin UL

in Journal of Intellectual Property Law and Practice (2022), 17(11), 962-971

Detailed reference viewed: 57 (0 UL)
Full Text
Peer Reviewed
See detailArrival Declaration Forms. A New Gateway for Mapping Migration to Luxembourg
Venken, Machteld UL; Sauer, Arnaud

in Frontiers in Human Dynamics (2022)

Detailed reference viewed: 14 (2 UL)
Full Text
Peer Reviewed
See detailMeatless masculinity: Examining profiles of male veg*n eating motives and their relation to gendered self-concepts
Kakoschke, Kim; Hale, Miriam-Linnea UL; Sischka, Philipp UL et al

in Current Psychology (2022)

Meat is a food item that is often associated with masculinity. Considering this gender stereotype, research on vegan and vegetarian (veg*n) eating motives has focused on how distinct motives relate to ... [more ▼]

Meat is a food item that is often associated with masculinity. Considering this gender stereotype, research on vegan and vegetarian (veg*n) eating motives has focused on how distinct motives relate to stereotypes of masculinity and femininity. Quantitative studies examining how masculinity and femininity are integrated into the self-concept of these eaters are lacking to date. Moreover, investigators have largely tested the effects of motives in isolation, neglecting the possibility of different motivational profiles that relate differently to gendered self-concepts. The current study adopted a person-centred approach using cluster analysis to identify motivational profiles of self-identified veg*n males, thereby testing whether these profiles differ on dimensions of positive and negative masculinity and femininity. Self-reported data were collected via an online survey among people self-identifying as male and following a vegan or vegetarian dietary pattern (N = 738; 79.8% vegans). A k-means cluster analysis revealed three motivational profiles (n1= 439, 59.5%, ‘equally-balanced’; n2 = 254, 34.4%, ‘ethical-environmental’; n3= 45, 6.1%, ‘moderately-health’). Unique differences emerged in gendered self-concepts tied to all veg*n eating motive profile memberships: Equally-balanced motivated eaters perceived themselves to possess the most positive stereotypical feminine attributes, while moderately-health motivated eaters described themselves with the least of these attributes. Veg*n eaters did not differ on any of the other dimensions of femininity and masculinity. The present study demonstrates that a cluster analysis supplies important information on what combinations of eating motives veg*n males report and how those relate to differences in gendered self-concepts of veg*n eaters. [less ▲]

Detailed reference viewed: 28 (1 UL)
Full Text
Peer Reviewed
See detailExperimental separation of the onset of slip and sharkskin melt instabilities during the extrusion of silica‑filled, styrene–butadiene rubber compounds
Gansen, Alex UL; Řehoř, Martin; Sill, Clemens et al

in Rheologica Acta (2022)

The flow curves of polymers often reveal the onset of melt instabilities such as sharkskin, stick–slip, or gross melt fracture, in order of increasing shear rates. The focus of this work lies in the ... [more ▼]

The flow curves of polymers often reveal the onset of melt instabilities such as sharkskin, stick–slip, or gross melt fracture, in order of increasing shear rates. The focus of this work lies in the application of the Göttfert sharkskin option to the investigation of flow curves of styrene-butadiene rubber (SBR) compounds. The sharkskin option consists of highly sensitive pressure transducers located inside a slit die of a capillary rheometer. This tool allows the detection of in-situ pressure fluctuation characteristics of different melt instabilities. It is shown that the change of slope of the transition region in the flow curves is only linked to slip. Dynamic Mechanical Analysis (DMA) measurements furthermore show that the shear rate at which the change of slope can be observed shows the same temperature dependency as the viscous and elastic properties of the compounds. [less ▲]

Detailed reference viewed: 34 (6 UL)
Full Text
Peer Reviewed
See detailIntronic enhancers of the human SNCA gene predominantly regulate its expression in brain in vivo.
Cheng, Fubo; Zheng, Wenxu; Liu, Chang et al

in Science advances (2022), 8(47), 6324

Evidence from patients with Parkinson's disease (PD) and our previously reported α-synuclein (SNCA) transgenic rat model support the idea that increased SNCA protein is a substantial risk factor of PD ... [more ▼]

Evidence from patients with Parkinson's disease (PD) and our previously reported α-synuclein (SNCA) transgenic rat model support the idea that increased SNCA protein is a substantial risk factor of PD pathogenesis. However, little is known about the transcription control of the human SNCA gene in the brain in vivo. Here, we identified that the DYT6 gene product THAP1 (THAP domain-containing apoptosis-associated protein 1) and its interaction partner CTCF (CCCTC-binding factor) act as transcription regulators of SNCA. THAP1 controls SNCA intronic enhancers' activities, while CTCF regulates its enhancer-promoter loop formation. The SNCA intronic enhancers present neurodevelopment-dependent activities and form enhancer clusters similar to "super-enhancers" in the brain, in which the PD-associated single-nucleotide polymorphisms are enriched. Deletion of the SNCA intronic enhancer clusters prevents the release of paused RNA polymerase II from its promoter and subsequently reduces its expression drastically in the brain, which may provide new therapeutic approaches to prevent its accumulation and thus related neurodegenerative diseases defined as synucleinopathies. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailElectronic and thermal signatures of phosphorene grain boundaries under uniaxial strain
Rodríguez Méndez, Alvaro; Medrano Sandonas, Leonardo UL; Dianat, Arezoo et al

in Physical Review Materials (2022), 6(114003),

Two-dimensional materials have great potential for applications as high-performance electronic devices and efficient thermal rectificators. Among them, pristine phosphorene, a single layer of black ... [more ▼]

Two-dimensional materials have great potential for applications as high-performance electronic devices and efficient thermal rectificators. Among them, pristine phosphorene, a single layer of black phosphorus, has shown promising properties such as ultrahigh charge mobility, a tunable band gap, and mechanical flexibility. However, the introduction of extended structural defects such as grain boundaries (GBs) has, in general, a detrimental influence on the electronic and thermal transport properties by causing additional scattering events. In this computational study, based on a combination of a density-functional parametrized tight-binding approach with the Landauer theory of quantum transport, we show that applying a strain can help to partially counteract this effect. We exemplify this by addressing the electronic and phononic transmission of two specific grain boundaries containing 5|7 (GB1) and 4|8 (GB2) defects, respectively. Under uniaxial strain, the electronic band gaps can be reduced for both types of GB, while the respective thermal conductance is only weakly affected despite rather strong changes in the frequency-resolved phonon transmission. The combination of both effects mainly produces an increase of about a factor of 2 in the thermoelectric figure of merit ZT for a GB2 system. Hence, our results provide insights into the manipulation of transport properties as well as the generation of potential thermoelectric materials based on phosphorene. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailModular Orders on Defaults in Formal Argumentation
Pardo Ventura, Pere UL; Strasser, Christian

in Journal of Logic and Computation (2022)

Default logic and formal argumentation are paradigmatic methods in the study of nonmonotonic inference. Defeasible information often comes in different strengths stemming from different degrees of ... [more ▼]

Default logic and formal argumentation are paradigmatic methods in the study of nonmonotonic inference. Defeasible information often comes in different strengths stemming from different degrees of reliability in epistemic applications or from varying strengths of authorities issuing norms in deontic applications. In both paradigms methods have been developed to deal with prioritized knowledge bases and normative systems. Questions of comparability of these methods therefore naturally arise. Argumentation theory has been developed with a strong emphasis on unification. It is therefore a desideratum to obtain natural representations of various approaches to (prioritized) default logic within frameworks of structured argumentation, such as ASPIC. Important steps in this direction have been presented in Liao et al. (2016, 2018). In this work we identify and address some problems in earlier translations, we broaden the focus from total to modular orderings of defaults, and we consider non-normal defaults. [less ▲]

Detailed reference viewed: 30 (0 UL)
Full Text
Peer Reviewed
See detailReliability of Spectrum-Efficient Mixed Satellite-Underwater Systems
Gamal, Christina; Elsayed, Mohamed; Samir, Ahmed et al

in IEEE Open Journal of the Communications Society (2022), 3

The combination of radio-frequency (RF) communication and underwater optical wireless communication (UOWC) plays a vital role in the underwater Internet of Things (UIoT). This correspondence proposes a ... [more ▼]

The combination of radio-frequency (RF) communication and underwater optical wireless communication (UOWC) plays a vital role in the underwater Internet of Things (UIoT). This correspondence proposes a dual-hop hybrid satellite underwater system that exploits non-orthogonal multiple access (NOMA) as a spectrum-efficient access technique. The RF link from the satellite to the relay on an oil platform is presumptively subject to a Shadowed-Rician (SR) fading, while the UOWC channels from the relay to the underwater destinations are suggested to follow Exponential-Generalized Gamma (EGG) distributions. The reliability of the system is characterized in terms of both underwater destinations and system outage probabilities (OPs). We derive new closed-form expressions for the OPs under imperfect successive interference cancellation (SIC) conditions. Furthermore, the asymptotic OP and the diversity order (DO) are obtained to learn more about the system’s performance. The results are verified through an extensive representative Monte-Carlo simulation. Also, we investigate the performance against the turbulence of the salty water, air bubbles level (BL), temperature gradients (TG), shadowing parameters, and satellite pointing errors due to satellite motion, even if the beam is pointed at the center of the directive antenna relay, the beam will randomly oscillate. Finally, we contrast our approach with the conventional orthogonal multiple access (OMA) scheme to demonstrate its superiority. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailRent, sell, and remanufacture: The manufacturer’s choice when remanufacturing can be outsourced
liu, Jian; Mantin, Binyamin UL; Song, Xuefeng

in European Journal of Operational Research (2022), 303(1), 184-200

Manufacturers have increasingly started offering rental options for the products they sell. Renting products offers an opportunity: segmenting consumers. However, this also raises a challenge: what to do ... [more ▼]

Manufacturers have increasingly started offering rental options for the products they sell. Renting products offers an opportunity: segmenting consumers. However, this also raises a challenge: what to do with the returned products? One solution is to remanufacture these products and then rent or resell them. Subsequently, should remanufacturing be outsourced to a third-party firm that can remanufacture at a lower cost? Here, we use a multi-period setting and examine the optimal decisions for different selling and renting constellations. Importantly, we allow the manufacturing costs of the sales and rental products to differ, as they seem to be critical in determining the manufacturer's renting and selling decisions and remanufacturing strategies. For example, under integrated (i.e. in-house) remanufacturing, when the new rental product's manufacturing cost is sufficiently high, no remanufacturing happens. Under both remanufacturing strategies—integrated and outsourced—the manufacturer does not rent new products in the second period if the manufacturing costs of the sales and rental products are identical. If the rental product's manufacturing cost is either sufficiently low or high, then integrated remanufacturing is more profitable; when this manufacturing cost is within a moderate range, the manufacturer outsources remanufacturing to an independent remanufacturer. Surprisingly, in some situations, the production quantity of the new sales product may even increase with its manufacturing cost. This is because the manufacturer may extract an even higher margin compared with the new rental product. Finally, we also consider several extensions such as uncertainty regarding the quality of the returned goods, simultaneous selling and renting of remanufactured goods, and longer horizons and the product's life cycle. [less ▲]

Detailed reference viewed: 81 (2 UL)
Full Text
Peer Reviewed
See detailStructural stability despite increased fragmentation: The 2021 county elections in Croatia
Glaurdic, Josip UL; Fel, Leo UL

in Regional and Federal Studies (2022)

The 2021 county elections in Croatia were the perfect example of political change amidst continuity. Relatively new parties and independent candidates made significant inroads against the dominant players ... [more ▼]

The 2021 county elections in Croatia were the perfect example of political change amidst continuity. Relatively new parties and independent candidates made significant inroads against the dominant players of the center-right and the center-left, most notably in the capital city of Zagreb, where a novel leftist political platform won the elections conclusively. The rise of new and credible alternatives resulted in increased fragmentation of the county assemblies and likely more unstable regional governments in the near future. On the other hand, the party that has dominated Croatian politics since independence, Croatian Democratic Union (HDZ), continued that dominance on the county-level by winning 15 out of 21 offices of county prefects. More important, the determinants of electoral support for the principal political blocs have remained unchanged from the pattern observed in all national elections since the end of Croatia’s War of Independence more than two and a half decades ago. [less ▲]

Detailed reference viewed: 30 (1 UL)
Full Text
Peer Reviewed
See detailPrivacy-preserving federated learning for residential short-term load forecasting
Delgado Fernandez, Joaquin UL; Potenciano Menci, Sergio UL; Lee, Chul Min UL et al

in Applied Energy (2022), 326

With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these ... [more ▼]

With high levels of intermittent power generation and dynamic demand patterns, accurate forecasts for residential loads have become essential. Smart meters can play an important role when making these forecasts as they provide detailed load data. However, using smart meter data for load forecasting is challenging due to data privacy requirements. This paper investigates how these requirements can be addressed through a combination of federated learning and privacy preserving techniques such as differential privacy and secure aggregation. For our analysis, we employ a large set of residential load data and simulate how different federated learning models and privacy preserving techniques affect performance and privacy. Our simulations reveal that combining federated learning and privacy preserving techniques can secure both high forecasting accuracy and near-complete privacy. Specifically, we find that such combinations enable a high level of information sharing while ensuring privacy of both the processed load data and forecasting models. Moreover, we identify and discuss challenges of applying federated learning, differential privacy and secure aggregation for residential short-term load forecasting. [less ▲]

Detailed reference viewed: 67 (18 UL)
Full Text
Peer Reviewed
See detailOverlap of parafermionic zero modes at a finite distance
Teixeira, Raphael L. R. C.; Haller, Andreas UL; Singh, Roshni et al

in Physical Review Research (2022)

Parafermion bound states (PBSs) are generalizations of Majorana bound states (MBSs) and have been predicted to exist as zero-energy eigenstates in proximitized fractional quantum Hall edge states ... [more ▼]

Parafermion bound states (PBSs) are generalizations of Majorana bound states (MBSs) and have been predicted to exist as zero-energy eigenstates in proximitized fractional quantum Hall edge states. Similarly to MBSs, a finite distance between the PBS can split the ground state degeneracy. However, parafermionic modes have a richer exchange statistics than MBSs, so several interaction terms are allowed by the underlying $\mathbb{Z}_{2n}$ symmetry, rendering the effective Hamiltonian governing a pair of PBSs at a finite distance nontrivial. Here, we use a combination of analytical techniques (semiclassical instanton approximation) and numerical techniques (quantum Monte Carlo simulations) to determine the effective coupling Hamiltonian. For this purpose, we go beyond the dilute one-instanton gas approximation and show how finite-size effects can give rise to higher-order parafermion interactions. We find excellent agreement between the analytical results and Monte Carlo simulations. We estimate that these finite-size corrections should be observable in some of the recently proposed experiments to observe PBSs in strongly correlated systems. [less ▲]

Detailed reference viewed: 21 (5 UL)
Full Text
Peer Reviewed
See detailTranslanguaging stance of preschool teachers working with multilingual children in Luxembourg
Aleksic, Gabrijela UL; Bebic-Crestany, Dzoen

in International Journal of Multilingualism (2022)

In today’s linguistically and culturally diverse schools, it is important that teachers use inclusive pedagogies, such as translanguaging. This pedagogy assumes that teachers have positive attitudes ... [more ▼]

In today’s linguistically and culturally diverse schools, it is important that teachers use inclusive pedagogies, such as translanguaging. This pedagogy assumes that teachers have positive attitudes towards children’s home languages and cultures (translanguaging stance), which we explored in our study with 40 preschool teachers in Luxembourg. The teachers participated in the professional development course on translanguaging over six months. To identify teachers’ stance before and after the course, they completed questionnaires and participated in focus groups, and after completing the course, teacher–child interactions in the classroom were videotaped and analysed. Empirical findings of the questionnaires demonstrate that teachers’ attitudes towards children’s multilingualism and home languages increased significantly after participating in the course. In the focus groups, the majority of teachers expressed a mild translanguaging stance, meaning that they were afraid that the inclusion of children’s home languages will hinder children’s development of the school language, Luxembourgish. Finally, in the videotaped observations, the foci teachers demonstrated their positive stance in one activity and a negative stance in another. Following the study's multi-method approach, we conclude that teachers’ attitudes were ambivalent and paradoxical, which depicts a rather realistic picture of preschool teachers’ attitudes in Luxembourg. [less ▲]

Detailed reference viewed: 180 (24 UL)
Full Text
Peer Reviewed
See detailMultifunctional Properties of Polyvinylidene-Fluoride-Based Materials: From Energy Harvesting to Energy Storage
Fricaudet, Matthieu; Ziberna, Katarina; Salmanov, Samir et al

in ACS Applied Electronic Materials (2022), 4(11), 54295436

Organic ferroelectrics are increasingly important due to their complementary properties to classical, inorganic ferroelectrics. Flexibility, chemical resistance, scalability, high breakdown fields, and ... [more ▼]

Organic ferroelectrics are increasingly important due to their complementary properties to classical, inorganic ferroelectrics. Flexibility, chemical resistance, scalability, high breakdown fields, and biocompatibility are attractive for many applications like energy harvesting and storage. The most known energy harvesting methods are piezoelectric, pyroelectric, and triboelectric. Here, we apply the well-established material's figures of merit to five polyvinylidene-fluoride-based compositions ranging from ferroelectric to relaxor-like behavior to emphasize the importance of several key material parameters contributing to the maximal power output of energy harvesting devices. Afterward, we discuss the possibility of the same functional material storing the output energy for the development of scalable multifunctional devices. [less ▲]

Detailed reference viewed: 32 (3 UL)
Full Text
Peer Reviewed
See detailTopological origin of the protein folding transition
di Cairano, Loris UL; Capelli, Riccardo; Bel-Hadj-Aissa, Ghofrane et al

in Physical Review. E. (2022), 106

Detailed reference viewed: 13 (0 UL)
Full Text
Peer Reviewed
See detailMultiuser-MISO Precoding under Channel Phase Uncertainty in Satellite Communication Systems
Martinez Marrero, Liz UL; Haqiqatnejad, Alireza UL; Merlano Duncan, Juan Carlos UL et al

in IEEE Open Journal of Vehicular Technology (2022)

Linear and symbol-level precoding in satellite communications have received increasing research attention thanks to their ability to tackle inter-beam interference, allowing the use of spectral resources ... [more ▼]

Linear and symbol-level precoding in satellite communications have received increasing research attention thanks to their ability to tackle inter-beam interference, allowing the use of spectral resources more efficiently. However, there are still challenges and open questions regarding the implementation of practical precoding systems taking the phase uncertainties in estimating the channel state information into account. This work assesses the impact of phase variations and uncertainties inherent to the satellite communication system operating a precoded forward link. Specifically, we address the inability to measure at the user terminal, the absolute phase rotation introduced by the channel, and the transponder local oscillator phase noise effects on the precoding operations considering the use of frequency division multiplexing in the forward-uplink transmission. We formally demonstrate that the system performance for linear and non-linear precoding operations is not affected by the uncertainty in the phase measurements at the user terminal. Additionally, we show that using a single frequency reference for all the local oscillators at the transponder does not avoid the phase variations related to the frequency division multiplexing in the forward-uplink. This work demonstrates that these phase variations would not affect the system performance for an ideal zero-delay precoding loop. However, this is not feasible in practical scenarios, where the phase noise of the frequency reference at the transponder and the loop delay determine the impact on the system performance. We validate our results by simulations considering three frequency references with different stability levels in a typical GEO satellite system. Our results suggest that practical implementations of multiuser-MISO precoding systems must include a differential phase synchronization loop to compensate for this performance degradation. [less ▲]

Detailed reference viewed: 24 (0 UL)
Full Text
Peer Reviewed
See detailLes applications pratiques de la fiducie en droit des affaires luxembourgeois
Prüm, André UL

in Semaine Juridique. Notariale et Immobilière (2022), 45

Le succès que connaît la fiducie luxembourgeoise depuis près de quarante ans tient avant tout à la sécurité que lui procure l’intervention obligatoire, en qualité de fiduciaire, d’un professionnel des ... [more ▼]

Le succès que connaît la fiducie luxembourgeoise depuis près de quarante ans tient avant tout à la sécurité que lui procure l’intervention obligatoire, en qualité de fiduciaire, d’un professionnel des secteurs financier ou des assurances. Une enquête de terrain menée en début d’année montre qu’elle sert principalement comme support à la gestion de portefeuilles de valeurs mobilières, à des programmes d’émission de « fiduciary notes » par des établissements de crédit et des organismes de titrisation et à de dépôts de liquidités de fonds d’investissements. [less ▲]

Detailed reference viewed: 28 (5 UL)
Full Text
Peer Reviewed
See detailDefect Formation and Healing at Grain Boundaries in Lead-Halide Perovskites
Kaiser, Waldemar; Hussain, Kashif; Singh, Ajay UL et al

in Journal of Materials Chemistry A (2022)

Polycrystalline perovskite solar cells show high power conversion efficiencies despite the presence of grain boundaries (GBs). The benign nature of GBs on the electronic properties and structural ... [more ▼]

Polycrystalline perovskite solar cells show high power conversion efficiencies despite the presence of grain boundaries (GBs). The benign nature of GBs on the electronic properties and structural stability in metal-halide perovskites contradicts their propensity for point defect formation, a controversy that is far from being understood. In this work, we combine ab initio molecular dynamics and density functional theory calculations on the S5[130] GB of cesium lead iodide, CsPbI3, to shed light on the structural and electronic properties of such GBs. Our results present the first evidence of structural healing of GBs driven by the facile migration of iodine ions, resulting in stabilized GB structures with reduced hole trap states and shallow electron trap states by strain-induced Pb–Pb dimers. Drift-diffusion simulations reveal that shallow electron trap states in GB mainly lower open-circuit voltage by enhanced non-radiative recombination. Finally, we observe the spontaneous formation of iodine Frenkel defects with reduced formation energies compared to the perovskite bulk. Overall, our study reveals a controversy of GBs showing a moderate impact on the electronic properties by structural healing but a detrimental impact on the point defect densities, both being connected to the facile migration of iodine ions in GBs. [less ▲]

Detailed reference viewed: 103 (5 UL)
Full Text
Peer Reviewed
See detailDas Versprechen der Zirkularität
Hild, Paula UL; Schulz, Christian UL

in Standort (2022)

Against the backdrop of the recent political dynamics in the EU and in many of its member states regarding the Circular Economy, the present article discusses the impact of the concept so far and the ... [more ▼]

Against the backdrop of the recent political dynamics in the EU and in many of its member states regarding the Circular Economy, the present article discusses the impact of the concept so far and the challenges related to its implementation. In particular, it sheds a critical light on the following three aspects: first, the selective reception of the approach by key actors in industry and politics; second, the obvious implementation problems in trade and industry; and third, the underlying, growth-fixated economic model. Results from our own empirical work on the Luxembourg construction industry illustrate the reasoning. The article argues for a holistic and growth-critical understanding of circularity that not only gives space to orientation of efficiency and consistency but above all also to considerations of sufficiency. [less ▲]

Detailed reference viewed: 59 (8 UL)
See detailQu'est-ce que l'histoire publique ?
Cauvin, Thomas UL

in Entre temps (2022)

Detailed reference viewed: 24 (2 UL)
Full Text
Peer Reviewed
See detailBook Review: Language Management: From Bricolage to Strategy in British Companies
Lovrits, Veronika UL

in International Journal of Cross Cultural Management (2022)

Detailed reference viewed: 19 (5 UL)
Full Text
See detailA Legal Study of the Future of Chinese Infrastructure Development in the Western Balkans in the Light of the EU Rebuilding of Ukraine
Gubenko, Stanislav UL

in China, Law and Development (2022), (7),

The paper seeks to find out whether the successful EU rebuilding of Ukraine according to European standards can become a game-changer in the competition between Chinese and European infrastructure ... [more ▼]

The paper seeks to find out whether the successful EU rebuilding of Ukraine according to European standards can become a game-changer in the competition between Chinese and European infrastructure development initiatives in the Western Balkans. [less ▲]

Detailed reference viewed: 41 (9 UL)
Full Text
Peer Reviewed
See detailActive reconfiguration of cytoplasmic lipid droplets governs migration of nutrient-limited phytoplankton
Sengupta, Anupam UL; Dhar, Jayabrata UL; Danza, Francesco UL et al

in Science Advances (2022), 8(44), 1-16

Nutrient availability, along with light and temperature, drives marine primary production. The ability to migrate vertically, a critical trait of motile phytoplankton, allows species to optimize nutrient ... [more ▼]

Nutrient availability, along with light and temperature, drives marine primary production. The ability to migrate vertically, a critical trait of motile phytoplankton, allows species to optimize nutrient uptake, storage, and growth. However, this traditional view discounts the possibility that migration in nutrient-limited waters may be actively modulated by the emergence of energy-storing organelles. Here, we report that bloom-forming raphidophytes harness energy-storing cytoplasmic lipid droplets (LDs) to biomechanically regulate vertical migration in nutrient-limited settings. LDs grow and translocate directionally within the cytoplasm, steering strain-specific shifts in the speed, trajectory, and stability of swimming cells. Nutrient reincorporation restores their swimming traits, mediated by an active reconfiguration of LD size and coordinates. A mathematical model of cell mechanics establishes the mechanistic coupling between intracellular changes and emergent migratory behavior. Amenable to the associated photophysiology, LD-governed behavioral shift highlights an exquisite microbial strategy toward niche expansion and resource optimization in nutrient-limited oceans. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailAbelianization and fixed point properties of units in integral group rings
Bächle, Andreas; Janssens, Geoffrey; Jespers, Eric et al

in Mathematische Nachrichten (2022)

Detailed reference viewed: 48 (7 UL)
Full Text
Peer Reviewed
See detailEFFECTIVE CONTRACTION OF SKINNING MAPS
Cremaschi, Tommaso UL; Dello Schiavo, Lorenzo

in Proceedings of the American Mathematical Society, Series B (2022), 9

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailLong time series of absolute gravity observations in Kulusuk, southeast Greenland
Francis, Olivier UL

in Geoscience Data Journal (2022), n/a(n/a),

Abstract This report contains terrestrial absolute gravity measurements performed near the village of Kulusuk in southeast Greenland. It represents an exceptionally long time series of nearly two decades ... [more ▼]

Abstract This report contains terrestrial absolute gravity measurements performed near the village of Kulusuk in southeast Greenland. It represents an exceptionally long time series of nearly two decades. The measurements began in July 1996 until July 2015. The station is located a few meters beside a permanent GNSS station. The final gravity values (g-values), more precisely the accelerations due to gravity, are listed along their associated uncertainties. A description of the station, a short explanation on the absolute gravimeter, and the data processing are presented. [less ▲]

Detailed reference viewed: 24 (1 UL)
Full Text
Peer Reviewed
See detailThe Cyber Resilience Act: the EU Commission’s proposal for a horizontal regulation on cybersecurity for products with digital elements. An introduction
Chiara, Pier Giorgio UL

in International Cybersecurity Law Review (2022)

The EU Commission presented on 15 September 2022 the proposal for a ‘Regulation on horizontal cybersecurity requirements for products with digital elements amending Regulation (EU) 2019/1020’ (Cyber ... [more ▼]

The EU Commission presented on 15 September 2022 the proposal for a ‘Regulation on horizontal cybersecurity requirements for products with digital elements amending Regulation (EU) 2019/1020’ (Cyber Resilience Act, CRA). This long-awaited piece of legislation would complement EU cybersecurity acquis by laying down horizontal cybersecurity requirements for all products with digital elements. This article sheds light on the ‘horizontal’ character of the CRA proposal by highlighting its main pillars. In particular, the contribution takes into account the new set of obligations placed on economic operators, the conformity assessment procedures as well as the market surveillance framework and the interplay with other legislative initiatives, both in the policy area and outside EU cybersecurity law. Against the backdrop of the sectoral regulatory approach adopted thus far by the Commission vis-à-vis cybersecurity requirements for products, horizontal intervention is needed to ensure legal certainty, avoiding duplicative obligations and further market fragmentation. [less ▲]

Detailed reference viewed: 53 (4 UL)
Full Text
Peer Reviewed
See detailElectricity powered by blockchain: A review with a European perspective
Roth, Tamara UL; Utz, Manuel; Baumgarte, Felix et al

in Applied Energy (2022), 325

Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify ... [more ▼]

Blockchain is no longer just a hype technology, and effective blockchain applications exist in many industries. Yet, few blockchain projects have been successful in Europe’s energy systems. To identify the reasons for this slow progress, we reviewed the recent energy literature regarding the use of blockchain, analyzed industry reports, and interviewed experts who have conducted blockchain projects in Europe’s energy systems. Our analysis reveals eight common use cases, their expected benefits, and the challenges encountered. We find that the expected benefits are often little more than generic hopes, largely outweighed by technological, organizational, and regulatory challenges. The identified challenges are significant and numerous, especially for peer-to-peer trading and microgrid use cases. The fact that few projects have yet provided robust evidence for profitable use suggests there is still a rocky road ahead. Moreover, many use cases appear to require more than just blockchain technology to succeed. In particular, privacy and scalability requirements often call for systems in which blockchains only take a backseat. This realization may be essential for the future use of blockchain technology in energy systems – in Europe and beyond. [less ▲]

Detailed reference viewed: 32 (10 UL)
Full Text
Peer Reviewed
See detailSecurity–Reliability Tradeoff Analysis for SWIPT- and AF-Based IoT Networks With Friendly Jammers
Nguyen, Tan N.; Tran, Dinh-Hieu; Chien, Trinh Van et al

in IEEE Internet of Things Journal (2022), 9(21), 21662-21675

Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in the Internet of Things (IoT) systems ... [more ▼]

Radio-frequency (RF) energy harvesting (EH) in wireless relaying networks has attracted considerable recent interest, especially for supplying energy to relay nodes in the Internet of Things (IoT) systems to assist the information exchange between a source and a destination. Moreover, limited hardware, computational resources, and energy availability of IoT devices have raised various security challenges. To this end, physical-layer security (PLS) has been proposed as an effective alternative to cryptographic methods for providing information security. In this study, we propose a PLS approach for simultaneous wireless information and power transfer (SWIPT)-based half-duplex (HD) amplify-and-forward (AF) relaying systems in the presence of an eavesdropper. Furthermore, we take into account both static power splitting relaying (SPSR) and dynamic power splitting relaying (DPSR) to thoroughly investigate the benefits of each one. To further enhance secure communication, we consider multiple friendly jammers to help prevent wiretapping attacks from the eavesdropper. More specifically, we provide a reliability and security analysis by deriving closed-form expressions of outage probability (OP) and intercept probability (IP), respectively, for both the SPSR and DPSR schemes. Then, simulations are also performed to validate our analysis and the effectiveness of the proposed schemes. Specifically, numerical results illustrate the nontrivial tradeoff between reliability and security of the proposed system. In addition, we conclude from the simulation results that the proposed DPSR scheme outperforms the SPSR-based scheme in terms of OP and IP under the influences of different parameters on system performance. [less ▲]

Detailed reference viewed: 14 (3 UL)
Full Text
Peer Reviewed
See detailEditorial
Cole, Mark David UL; Klass, Nadine

in UFITA - Archiv für Medienrecht und Medienwissenschaft (2022), 86(1), 3-5

Detailed reference viewed: 18 (3 UL)
Full Text
Peer Reviewed
See detailAmbient intelligence approach: Internet of Things based decision performance analysis for intrusion detection
Nagarajan, Senthil Murugan UL

in Computer Communications (2022), 195

In recent infrastructures, Internet of Things (IoT) have become an important technology for connecting various actuators and sensors over wireless networks. Due to increase in mission-critical ... [more ▼]

In recent infrastructures, Internet of Things (IoT) have become an important technology for connecting various actuators and sensors over wireless networks. Due to increase in mission-critical infrastructures, we make use of these new technologies for reliable communication but their security is always not promising in terms of availability, confidentiality, integrity, and privacy of network services. Users can be compromised and vulnerable by a motivated malicious opponent unless they are not adequately protected by a robust defense. Due to this reason, an ambient intelligence approach for Intrusion Detection System (IDS) is required. In this research, ww proposed Ambient Approach based on Reinforcement Learning Integrated Deep Q-Neural Network (RL-DQN) model for WSNs and IoT in which it leverages the Markov decision process (MDP) formalism to enhance the decision performance in IDS. We deploy RL-DQN-IDS over Edge-cloud intrusion detection infrastructure in which binary attack classification of the network traffic is performed at the edge network while multi-attack classification is performed at the cloud network. To identify intrusions, we use a two-phase process that includes an initial learning phase that relies on RL, followed by a detection and classification phase that relies on DQN. We used four datasets namely UNSW-NB-15, BoTNeTIoT-L01, CICIDS2017 and IoTID20 with a smart house simulation environment configured with WSN and IoT technologies to evaluate performance. Accuracy, precision, and recall were all considered while assessing the dataset under consideration. When compared to five other machine learning models, the RL-DQN model method has demonstrated superior performance. This model outperforms the other five that were tested. [less ▲]

Detailed reference viewed: 47 (4 UL)
Full Text
Peer Reviewed
See detailSlow, ordinary and rapid points for Gaussian Wavelets Series and application to Fractional Brownian Motions
Esser, Céline; Loosveldt, Laurent UL

in ALEA: Latin American Journal of Probability and Mathematical Statistics (2022), 19

We study the Hölderian regularity of Gaussian wavelets series and show that they display, almost surely, three types of points: slow, ordinary and rapid. In particular, this fact holds for the Fractional ... [more ▼]

We study the Hölderian regularity of Gaussian wavelets series and show that they display, almost surely, three types of points: slow, ordinary and rapid. In particular, this fact holds for the Fractional Brownian Motion. Finally, we remark that the existence of slow points is specific to these functions. [less ▲]

Detailed reference viewed: 22 (1 UL)
Full Text
Peer Reviewed
See detailPerceptual Content, Phenomenal Contrasts, and Externalism
Raleigh, Thomas UL

in Journal of Philosophy (2022), 119(11), 602-627

According to Sparse views of perceptual content, the phenomenal character of perceptual experience is exhausted by the experiential presentation of ‘low-level’ properties such as (in the case of vision ... [more ▼]

According to Sparse views of perceptual content, the phenomenal character of perceptual experience is exhausted by the experiential presentation of ‘low-level’ properties such as (in the case of vision) shapes, colors, and textures Whereas, according to Rich views of perceptual content, the phenomenal character of perceptual experience can also sometimes involve experiencing ‘high-level’ properties such as natural kinds, artefactual kinds, causal relations, linguistic meanings, and moral properties. An important dialectical tool in the debate between Rich and Sparse theorists is the so-called ‘method of phenomenal contrast’. I explore how this method of phenomenal contrast interacts with the sort of content-externalism made familiar by Putnam. I show that the possibility of Twin Earth style cases places important restrictions on the range of properties that the method of phenomenal contrast could plausibly apply to. Moreover, these restrictions would apply to some paradigmatically low-level properties as well as to some of the frequently advanced high-level properties. I also draw some general lessons about the different ways one might conceive of the relation between phenomenal character and representational content. [less ▲]

Detailed reference viewed: 43 (2 UL)
Full Text
Peer Reviewed
See detailDesigning a framework for digital KYC processes built on blockchain-based self-sovereign identity
Schlatt, Vincent; Sedlmeir, Johannes UL; Feulner, Simon et al

in Information and Management (2022), 59(7),

Know your customer (KYC) processes place a great burden on banks, because they are costly, inefficient, and inconvenient for customers. While blockchain technology is often mentioned as a potential ... [more ▼]

Know your customer (KYC) processes place a great burden on banks, because they are costly, inefficient, and inconvenient for customers. While blockchain technology is often mentioned as a potential solution, it is not clear how to use the technology’s advantages without violating data protection regulations and customer privacy. We demonstrate how blockchain-based self-sovereign identity (SSI) can solve the challenges of KYC. We follow a rigorous design science research approach to create a framework that utilizes SSI in the KYC process, deriving nascent design principles that theorize on blockchain’s role for SSI. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailVector Perturbation Channel Inversion forSWIPT MU-MISO Systems
Krikidis, Ioannis; Psomas, Constantinos; Chatzinotas, Symeon UL

in IEEE Wireless Communications Letters (2022)

This letter investigates the employment of vector-perturbation (VP) precoding to convey simultaneously informa-tion and energy in multiple-user multiple-input single-output(MU-MISO) downlink channel. We ... [more ▼]

This letter investigates the employment of vector-perturbation (VP) precoding to convey simultaneously informa-tion and energy in multiple-user multiple-input single-output(MU-MISO) downlink channel. We show that the conventionalVP in addition to the information capacity benefits that providesto linear channel inversion techniques, it enhances the harvestedenergy at the receivers due to the extended symbol constellation.To further boost harvesting performance, a modified VP tech-nique (named VP-EH) is proposed that designs the VP integeroffsets such as to maximize the delivered power. The proposedscheme incorporates an integer least square problem to find theclosest lattice point to a point which is given by a Rayleighquotient optimization problem. Finally, a convex combinationbetween conventional VP and VP-EH is proposed to achieve atrade-off between maximizing information or energy. Theoreticaland simulations results validate that VP is a promising techniqueto simultaneously convey information and energy in MU-MISOsystems. [less ▲]

Detailed reference viewed: 13 (1 UL)
Full Text
Peer Reviewed
See detailPrevalence of dementia in Latin America and Caribbean countries: Systematic review and meta-analyses exploring age, sex, rurality, and education as possible determinants
Ribeiro, Fabiana UL; Teixeira Santos, Ana Carolina UL; Caramelli, Paulo et al

in Ageing Research Reviews (2022)

Background Studies have shown that the prevalence of dementia in Latin America and the Caribbean (LAC) may be higher than in high-income countries. Thus, we sought to systematically analyse the prevalence ... [more ▼]

Background Studies have shown that the prevalence of dementia in Latin America and the Caribbean (LAC) may be higher than in high-income countries. Thus, we sought to systematically analyse the prevalence of dementia and explore possible drivers that lead to this disparity in LAC countries. Method We searched Pubmed, Web of Knowledge, Scopus, Lilacs, and SciELO for studies on dementia in LAC countries published in English, Spanish, and Portuguese. Random-effects model was applied. Results Thirty-one studies from 17 LAC countries were included. Pooled prevalence of all-cause dementia was 10.66%. Further analyses with studies providing raw prevalence by sex, area, and educational level showed a higher prevalence for women (8.97%) than for men (7.26%). Also, dementia prevalence was higher for rural than urban residents (7.71% vs 8.68%, respectively). Participants without formal education presented more than double the prevalence of dementia (21.37%) compared to those with at least one year of formal education (9.88%). Studies with more recent data collection showed higher dementia prevalence. Conclusion Our findings suggest a high global dementia prevalence in LAC countries and an unequal burden of dementia for women, lower-educated, and rural residents. Secular increases in dementia prevalence call for greater public health efforts for preventative actions. [less ▲]

Detailed reference viewed: 29 (0 UL)
Full Text
Peer Reviewed
See detailRIS-Assisted Robust Hybrid Beamforming AgainstSimultaneous Jamming and Eavesdropping Attacks
Sun, Yifu; An, Kang; Zhu, Yonggang et al

in IEEE Transactions on Wireless Communications (2022), 21(11), 9212-9231

Wireless communications are increasingly vulnera-ble to simultaneous jamming and eavesdropping attacks due tothe inherent broadcast nature of wireless channels. With thisfocus, due to the potential of ... [more ▼]

Wireless communications are increasingly vulnera-ble to simultaneous jamming and eavesdropping attacks due tothe inherent broadcast nature of wireless channels. With thisfocus, due to the potential of reconfigurable intelligent surface(RIS) in substantially saving power consumption and boostinginformation security, this paper is the first work to investigate theeffect of the RIS-assisted wireless transmitter in improving boththe spectrum efficiency and the security of multi-user cellularnetwork. Specifically, with the imperfect angular channel stateinformation (CSI), we aim to address the worst-case sum ratemaximization problem by jointly designing the receive decoder atthe users, both the digital precoder and the artificial noise (AN)at the base station (BS), and the analog precoder at the RIS, whilemeeting the minimum achievable rate constraint, the maximumwiretap rate requirement, and the maximum power constraint.To address the non-convexity of the formulated problem, we firstpropose an alternative optimization (AO) method to obtain anefficient solution. In particular, a heuristic scheme is proposedto convert the imperfect angular CSI into a robust one andfacilitate the developing a closed-form solution to the receivedecoder. Then, after reformulating the original problem into atractable one by exploiting the majorization-minimization (MM)method, the digital precoder and AN can be addressed by thequadratically constrained quadratic programming (QCQP), andthe RIS-aided analog precoder is solved by the proposed pricemechanism-based Riemannian manifold optimization (RMO).To further reduce the computational complexity of the pro-posed AO method and gain more insights, we develop a low-complexity monotonic optimization algorithm combined with thedual method (MO-dual) to identify the closed-form solution.Numerical simulations using realistic RIS and communicationmodels demonstrate the superiority and validity of our proposedschemes over the existing benchmark schemes. [less ▲]

Detailed reference viewed: 18 (2 UL)
Full Text
Peer Reviewed
See detailL’investissement et l’arbitrage au sens du Traité sur la Charte de l’énergie vu par la Cour de justice : la dimension stratégique de l’arrêt Komstroy à l’aune de l’Avis 1/20
Happold, Matthew UL; Menetrey, Séverine UL

in Revue trimestrielle de droit européen (2022), 2022(4), 693-704

The article comments on the ECJ's Komstroy judgment from the EU and international law perspectives.

Detailed reference viewed: 68 (2 UL)
Full Text
Peer Reviewed
See detailDéploiement de l’espace muséal et engagement participatif des visiteurs : l’expérience perceptive d’une statue en ronde-bosse
Blanc, Mathias UL

in Cahiers de l'École du Louvre (2022), 19

This article reports on fieldwork conducted at the Musée du Louvre-Lens with visitors discovering a sculpture from the Louvre, the Discophorus. To study the statue’s reception, we developed a mixed ... [more ▼]

This article reports on fieldwork conducted at the Musée du Louvre-Lens with visitors discovering a sculpture from the Louvre, the Discophorus. To study the statue’s reception, we developed a mixed methodology based on video recordings and “annotation traces in augmented reality”. The article presents the salient results of several weeks of fieldwork with and without the digital device Ikonikat 3D. It appears that our study corroborates the strong influence of the label on the way visitors look at the sculptures. But it also shows that the use of a digital device, depending on the human-machine interaction it supports, creates a space of vision and a space of action that have consequences in terms of distance and point of view on the work being viewed. Finally, we can observe different registers of meaning in the museum situation. This leads us to use a certain perspective to accompany visitor engagement with the sculptures. [less ▲]

Detailed reference viewed: 19 (3 UL)
Full Text
Peer Reviewed
See detailAdapting to Dynamic LEO-B5G Systems: Meta-Critic Learning Based Efficient Resource Scheduling
Yuan, Yaxiong; Lei, Lei; Vu, Thang Xuan UL et al

in IEEE Transactions on Wireless Communications (2022), 21(11), 9582-9595

Low earth orbit (LEO) satellite-assisted communications have been considered as one of the key elements in beyond 5G systems to provide wide coverage and cost-efficient data services. Such dynamic space ... [more ▼]

Low earth orbit (LEO) satellite-assisted communications have been considered as one of the key elements in beyond 5G systems to provide wide coverage and cost-efficient data services. Such dynamic space-terrestrial topologies impose an exponential increase in the degrees of freedom in network management. In this paper, we address two practical issues for an over-loaded LEO-terrestrial system. The first challenge is how to efficiently schedule resources to serve a massive number of connected users, such that more data and users can be delivered/served. The second challenge is how to make the algorithmic solution more resilient in adapting to dynamic wireless environments. We first propose an iterative suboptimal algorithm to provide an offline benchmark. To adapt to unforeseen variations, we propose an enhanced meta-critic learning algorithm (EMCL), where a hybrid neural network for parameterization and the Wolpertinger policy for action mapping are designed in EMCL. The results demonstrate EMCL’s effectiveness and fast-response capabilities in over-loaded systems and in adapting to dynamic environments compare to previous actor-critic and meta-learning methods. [less ▲]

Detailed reference viewed: 20 (1 UL)
Full Text
Peer Reviewed
See detailWavelet methods to study the pointwise regularity of the generalized Rosenblatt process
Daw, Lara UL; Loosveldt, Laurent UL

in Electronic Journal of Probability (2022), 27

We identify three types of pointwise behaviour in the regularity of the (generalized) Rosenblatt process. This extends to a non Gaussian setting previous results known for the (fractional) Brownian motion ... [more ▼]

We identify three types of pointwise behaviour in the regularity of the (generalized) Rosenblatt process. This extends to a non Gaussian setting previous results known for the (fractional) Brownian motion. On this purpose, fine bounds on the increments of the Rosenblatt process are needed. Our analysis is essentially based on various wavelet methods. [less ▲]

Detailed reference viewed: 76 (19 UL)
Full Text
Peer Reviewed
See detailReSQ: Reinforcement Learning-Based Queue Allocation in Software-Defined Queuing Framework
Maity, Ilora UL; Taleb, Tarik

in Journal of Networking and Network Applications (2022), 2(4), 143152

With the evolution of 5G networks, the demand for Ultra-Reliable Low Latency Communications (URLLC) services is increasing. Software-Defined Networking (SDN) offers flexible network management to ... [more ▼]

With the evolution of 5G networks, the demand for Ultra-Reliable Low Latency Communications (URLLC) services is increasing. Software-Defined Networking (SDN) offers flexible network management to prioritize URLLC services coexisting with best-effort traffic. Utilizing the network programmability feature of SDN, Software-Defined Queueing (SDQ) framework selects the optimal output port queue on forwarding devices and routing path for incoming traffic flows to provide deterministic Quality of Service (QoS) support required for URLLC traffic. However, in the existing SDQ framework, the selections of optimal queue and path are done manually by observing the traffic type of each incoming flow, the available bandwidth of each potential routing path, and the status of output port queues of each forwarding device on each potential routing path. The static allocations of path and queue for each flow are inefficient to provide a deterministic QoS guarantee for a high volume of incoming traffic which is typical in 5G networks. The limited buffer availability on the forwarding devices is another constraint regarding optimal queue allocation that ensures an end-to-end (E2E) delay guarantee. To address these challenges, in this paper, we extend the SDQ framework by automating queue management with a reinforcement learning (RL)-based approach. The proposed queue management approach considers diverse QoS demands as well as a limited buffer on the forwarding devices and performs prioritized queue allocation. Our approach also includes a hash-based flow grouping to handle a high volume of traffic having diverse latency demands and a path selection mechanism based on available bandwidth and hop count. The simulation result shows that the proposed scheme ReSQ reduces the QoS violation ratio by 10.45% as compared to the baseline scheme that selects queues randomly. [less ▲]

Detailed reference viewed: 28 (12 UL)
Full Text
Peer Reviewed
See detailCooperative backscatter NOMA with imperfect SIC: Towards energy efficient sum rate maximization in sustainable 6G networks
Ahmed, Manzoor; Ali, Zain; Khan, Wali Ullah UL et al

in Journal of King Saud University - Computer and Information Sciences (2022), 34(10), 7940-7947

The combination of backscatter communication with non-orthogonal multiple access (NOMA) has the potential to support low-powered massive connections in upcoming sixth-generation (6G) wireless networks ... [more ▼]

The combination of backscatter communication with non-orthogonal multiple access (NOMA) has the potential to support low-powered massive connections in upcoming sixth-generation (6G) wireless networks. More specifically, backscatter communication can harvest and use the existing RF signals in the atmosphere for communication, while NOMA provides communication to multiple wireless devices over the same frequency and time resources. This paper has proposed a new resource management framework for backscatter-aided cooperative NOMA communication in upcoming 6G networks. In particular, the proposed work has simultaneously optimized the base station’s transmit power, relaying node, the reflection coefficient of the backscatter tag, and time allocation under imperfect successive interference cancellation to maximize the sum rate of the system. To obtain an efficient solution for the resource management framework, we have proposed a combination of the bisection method and dual theory, where the sub-gradient method is adopted to optimize the Lagrangian multipliers. Numerical results have shown that the proposed solution provides excellent performance. When the performance of the proposed technique is compared to a brute-forcing search technique that guarantees optimal solution however, is very time-consuming, it was seen that the gap in performance is actually 0%. Hence, the proposed framework has provided performance equal to a cumbersome brute-force search technique while offering much less complexity. The works in the literature on cooperative NOMA considered equal time distribution for cooperation and direct communication. Our results showed that optimizing the time-division can increase the performance by more than 110% for high transmission powers. [less ▲]

Detailed reference viewed: 5 (0 UL)
Full Text
Peer Reviewed
See detailMaking Elections Work: Accountability with Selection and Control
Anesi, Vincent UL; Buisseret, Peter

in American Economic Journal. Microeconomics (2022), 14(4), 616-644

We study the limits of dynamic electoral accountability when voters are uncertain about politicians’ characteristics (adverse selection) and their actions (moral hazard). Existing work argues that voters ... [more ▼]

We study the limits of dynamic electoral accountability when voters are uncertain about politicians’ characteristics (adverse selection) and their actions (moral hazard). Existing work argues that voters cannot achieve their first-best payoff. This is attributed to inherent deficiencies of the electoral contract, including voters’ inability to pre-commit, and the restriction to a binary retention-replacement decision. We provide conditions under which, despite these constraints, voters can obtain arbitrarily close to the first-best payoff in an equilibrium of the electoral interaction. Our paper resolves that there need not be a trade-off between selection and control. [less ▲]

Detailed reference viewed: 93 (9 UL)
Full Text
Peer Reviewed
See detailA model-based framework for inter-app Vulnerability analysis of Android applications
Nirumand, Atefeh; Zamani, Bahman; Tork-Ladani, Behrouz et al

in Software: Practice and Experience (2022)

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailSpectral Efficiency Analysis of Hybrid Relay-Reflecting Intelligent Surface-Assisted Cell-Free Massive MIMO Systems
Nguyen, Nhan Thanh; Nguyen, Van-Dinh; Nguyen, Hieu Van et al

in IEEE Transactions on Wireless Communications (2022)

A cell-free (CF) massive multiple-input-multiple-output (mMIMO) system can provide uniform spectral efficiency (SE) with simple signal processing. On the other hand, a recently introduced technology ... [more ▼]

A cell-free (CF) massive multiple-input-multiple-output (mMIMO) system can provide uniform spectral efficiency (SE) with simple signal processing. On the other hand, a recently introduced technology called hybrid relay-reflecting intelligent surface (HR-RIS) can customize the physical propagation environment by simultaneously reflecting and amplifying radio waves in preferred directions. Thus, it is natural that incorporating HR-RIS into CF mMIMO can be a symbiotic convergence of these two technologies for future wireless communications. This motivates us to consider an HR-RIS-aided CF mMIMO system to utilize their combined benefits. We first model the uplink/downlink channels and derive the minimum-mean-square-error estimate of the effective channels. We then present a comprehensive analysis of SE performance of the considered system. Specifically, we derive closed-form expressions for the uplink and downlink SE. The results reveal important observations on the performance gains achieved by HR-RISs compared to conventional systems. The presented analytical results are also valid for conventional CF mMIMO systems and those aided by passive reconfigurable intelligent surfaces. Such results play an important role in designing new transmission strategies and optimizing HR-RIS-aided CF mMIMO systems. Finally, we provide extensive numerical results to verify the analytical derivations and the effectiveness of the proposed system design under various settings. [less ▲]

Detailed reference viewed: 15 (1 UL)
Full Text
Peer Reviewed
See detailRevealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review
Garrido, Gonzalo Munilla; Sedlmeir, Johannes UL; Uludag, Ömer et al

in Journal of Network and Computer Applications (2022), 207

IoT data markets in public and private institutions have become increasingly relevant in recent years because of their potential to improve data availability and unlock new business models. However ... [more ▼]

IoT data markets in public and private institutions have become increasingly relevant in recent years because of their potential to improve data availability and unlock new business models. However, exchanging data in markets bears considerable challenges related to disclosing sensitive information. Despite considerable research focused on different aspects of privacy-enhancing data markets for the IoT, none of the solutions proposed so far seems to find a practical adoption. Thus, this study aims to organize the state-of-the-art solutions, analyze and scope the technologies that have been suggested in this context, and structure the remaining challenges to determine areas where future research is required. To accomplish this goal, we conducted a systematic literature review on privacy enhancement in data markets for the IoT, covering 50 publications dated up to July 2020, and provided updates with 24 publications dated up to May 2022. Our results indicate that most research in this area has emerged only recently, and no IoT data market architecture has established itself as canonical. Existing solutions frequently lack the required combination of anonymization and secure computation technologies. Furthermore, there is no consensus on the appropriate use of blockchain technology for IoT data markets and a low degree of leveraging existing libraries or reusing generic data market architectures. We also identified significant challenges remaining, such as the copy problem and the recursive enforcement problem that - while solutions have been suggested to some extent - are often not sufficiently addressed in proposed designs. We conclude that privacy-enhancing technologies need further improvements to positively impact data markets so that, ultimately, the value of data is preserved through data scarcity and users' privacy and businesses-critical information are protected. [less ▲]

Detailed reference viewed: 19 (0 UL)
Full Text
Peer Reviewed
See detailMezinárodní soft law jako koncept v judikatuře správních soudů
Hubkova, Pavlina UL

in Jurisprudence (2022), (5), 1-10

International soft law as a concept encompasses a large number of diverse international acts that are not legally binding but still are capable to produce legal effects. For national courts, international ... [more ▼]

International soft law as a concept encompasses a large number of diverse international acts that are not legally binding but still are capable to produce legal effects. For national courts, international soft law presents a foreign element because it is adopted beyond the state and it defies the traditional binary concept of law, according to which legal norms are binding, otherwise they are not law. Nevertheless, this foreign element finds its way into the decision-making of Czech administrative courts. The article maps how and in which situations the administrative courts work with the concept of soft law and what consequences they draw from soft law. [less ▲]

Detailed reference viewed: 38 (2 UL)
Full Text
Peer Reviewed
See detailThe role of the bilateral subcutaneous plate in the minimal invasive stabilization of fragility fractures of the pelvis
Gerich, Torsten; Soliman, Ahmed Abdelsalam Mohamed UL; Kelm, Jens et al

in Trauma Case Reports (2022), 42

Introduction: Anterior pelvic ring fractures are common in geriatric patients. Current treatment algorithms recommend osteosynthesis if no pain free mobilisation is possible. For this a multitude of ... [more ▼]

Introduction: Anterior pelvic ring fractures are common in geriatric patients. Current treatment algorithms recommend osteosynthesis if no pain free mobilisation is possible. For this a multitude of surgical techniques have been described. Among these the Supraacetabular External Fixator (SEF) is regarded a simple and effective surgical procedure. However, this technique is associated with significant drawbacks. Alternatively, there is the option of an internal fixator or a formal plate osteosynthesis. It is the objective of this case report to present the Subcutaneous Iliopubic Plate (SIP) in a fragility fracture of the anterior and posterior pelvic ring. Case report: An 83-year-old female patient sustained a fracture of the anterior pelvic ring, the lateral sacrum and the medial femoral neck. After initially refusing any surgery, the patient agreed to have the endoprosthesis implanted first, and then secondarily to dorsoventral osteosynthesis of the pelvis. Dorsally a transiliosacral screw osteosynthesis was performed. Anteriorly a bilateral subcutaneous iliopubic plate-osteosynthesis was chosen, a plate position that is anterior to the aponeurosis. Conclusions: The subcutaneous plate has proven to be a quick and uncomplicated surgical procedure that is significantly better tolerated by patients than external stabilization. [less ▲]

Detailed reference viewed: 33 (6 UL)
Full Text
Peer Reviewed
See detailBetting Against Noisy Beta
Lehnert, Thorsten UL

in Journal of Finance and Data Science (2022), 8(-), 55-68

Detailed reference viewed: 69 (6 UL)
Full Text
Peer Reviewed
See detailNOMA-Enabled Optimization Framework for Next-Generation Small-Cell IoV Networks Under Imperfect SIC Decoding
Khan, Wali Ullah UL; Li, Xingwang; Ihsan, Asim et al

in IEEE Transactions on Intelligent Transportation Systems (2022)

To meet the demands of massive connections, diverse quality of services (QoS), ultra-reliable and low latency in the future sixth-generation (6G) Internet-of-vehicle (IoV) communications, we propose non ... [more ▼]

To meet the demands of massive connections, diverse quality of services (QoS), ultra-reliable and low latency in the future sixth-generation (6G) Internet-of-vehicle (IoV) communications, we propose non-orthogonal multiple access (NOMA)-enabled small-cell IoV network (SVNet). We aim to investigate the trade-off between system capacity and energy efficiency through a joint power optimization framework. In particular, we formulate a nonlinear multi-objective optimization problem under imperfect successive interference cancellation (SIC) detecting. Thus, the objective is to simultaneously maximize the sum-capacity and minimize the total transmit power of NOMA-enabled SVNet subject to individual IoV QoS, maximum transmit power and efficient signal detecting. To solve the nonlinear problem, we first exploit a weighted-sum method to handle the multi-objective optimization and then adopt a new iterative Sequential Quadratic Programming (SQP)-based approach to obtain the optimal solution. The proposed optimization framework is compared with Karush-Kuhn-Tucker (KKT)-based NOMA framework, average power NOMA framework, and conventional OMA framework. Monte Carlo simulation results unveil the validness of our derivations. The presented results also show the superiority of the proposed optimization framework over other benchmark frameworks in terms of system sum-capacity and total energy efficiency. [less ▲]

Detailed reference viewed: 20 (0 UL)
Full Text
Peer Reviewed
See detailIndividualised prediction of drug resistance and seizure recurrence after medication withdrawal in people with juvenile myoclonic epilepsy: A systematic review and individual participant data meta-analysis
Stevelink, Remi; Al-Toma, Dania; Jansen, Floor E. et al

in eClinicalMedicine (2022)

Summary Background A third of people with juvenile myoclonic epilepsy (JME) are drug-resistant. Three-quarters have a seizure relapse when attempting to withdraw anti-seizure medication (ASM) after ... [more ▼]

Summary Background A third of people with juvenile myoclonic epilepsy (JME) are drug-resistant. Three-quarters have a seizure relapse when attempting to withdraw anti-seizure medication (ASM) after achieving seizure-freedom. It is currently impossible to predict who is likely to become drug-resistant and safely withdraw treatment. We aimed to identify predictors of drug resistance and seizure recurrence to allow for individualised prediction of treatment outcomes in people with JME. Methods We performed an individual participant data (IPD) meta-analysis based on a systematic search in EMBASE and PubMed – last updated on March 11, 2021 – including prospective and retrospective observational studies reporting on treatment outcomes of people diagnosed with JME and available seizure outcome data after a minimum one-year follow-up. We invited authors to share standardised IPD to identify predictors of drug resistance using multivariable logistic regression. We excluded pseudo-resistant individuals. A subset who attempted to withdraw ASM was included in a multivariable proportional hazards analysis on seizure recurrence after ASM withdrawal. The study was registered at the Open Science Framework (OSF; https://osf.io/b9zjc/). Findings  368) was predicted by an earlier age at the start of withdrawal, shorter seizure-free interval and more currently used ASMs, resulting in an average internal-external cross-validation concordance-statistic of 0·70 (95%CI 0·68–0·73). Interpretation We were able to predict and validate clinically relevant personalised treatment outcomes for people with JME. Individualised predictions are accessible as nomograms and web-based tools. Funding MING fonds. [less ▲]

Detailed reference viewed: 35 (1 UL)
Full Text
Peer Reviewed
See detailAmbient backcom in beyond 5G NOMA networks: A multi-cell resource allocation framework
Khan, Wali Ullah UL; Memon, Fida Hussain; Dev, Kapal et al

in Digital Communications and Networks (2022)

The research of Non-Orthogonal Multiple Access (NOMA) is extensively used to improve the capacity of networks beyond the fifth-generation. The recent merger of NOMA with ambient Backscatter Communication ... [more ▼]

The research of Non-Orthogonal Multiple Access (NOMA) is extensively used to improve the capacity of networks beyond the fifth-generation. The recent merger of NOMA with ambient Backscatter Communication (BackCom), though opening new possibilities for massive connectivity, poses several challenges in dense wireless networks. One of such challenges is the performance degradation of ambient BackCom in multi-cell NOMA networks under the effect of inter-cell interference. Driven by providing an efficient solution to the issue, this article proposes a new resource allocation framework that uses a duality theory approach. Specifically, the sum rate of the multi-cell network with backscatter tags and NOMA user equipments is maximized by formulating a joint optimization problem. To find the efficient base station transmit power and backscatter reflection coefficient in each cell, the original problem is first divided into two subproblems, and then the closed form solution is derived. A comparison with the Orthogonal Multiple Access (OMA) ambient BackCom and pure NOMA transmission has been provided. Simulation results of the proposed NOMA ambient BackCom indicate a significant improvement over the OMA ambient BackCom and pure NOMA in terms of sum-rate gains. [less ▲]

Detailed reference viewed: 4 (0 UL)
Full Text
Peer Reviewed
See detailA Survey on Semantic Communications for Intelligent Wireless Networks
Lyer, Sridhar; Khanai, Rajashri; Torse, Dattaprasad et al

in Wireless Personal Communications (2022)

Research on intelligent wireless network aims at the development of a human society which is ubiquitous and mobile, simultaneously providing solutions to the coverage, capacity, and computing issues ... [more ▼]

Research on intelligent wireless network aims at the development of a human society which is ubiquitous and mobile, simultaneously providing solutions to the coverage, capacity, and computing issues. These networks will focus on provisioning intelligent use-cases through higher data-rates over the millimeter waves and the Tera-Hertz frequency. However, at such high frequencies, multiple non-desired phenomena such as, atmospheric absorption and blocking occur which create a bottleneck owing to resource scarcity. Hence, existing trend of exactly reproducing transmitted data at the receiver will result in a constant need for higher bandwidth. A possible solution to such a challenge lies in semantic communications which focuses on meaning (relevance or context) of the received data. This article presents a detailed survey on the recent technological trends in regard to semantic communications for intelligent wireless networks. Initially, the article focuses on the semantic communications architecture including the model, and source and channel coding. Next, cross-layer interaction, and various goal-oriented communication applications are detailed. Further, overall semantic communications trends are presented following which, the key challenges and issues are detailed. Lastly, this survey article is an attempt to significantly contribute towards initiating future research in the area of semantic communications for the intelligent wireless networks. [less ▲]

Detailed reference viewed: 16 (0 UL)
Full Text
Peer Reviewed
See detailOn reliability in the performance analysis of cognitive radio networks
Khan, Abd Ullah; Tanveer, Muhammad; Khan, Wali Ullah UL

in Journal of King Saud University - Computer and Information Sciences (2022)

Satisfying the quality of service (QoS) requirements of users in the form of channel availability and service retainability within the resource limited environment has been a major problem in cognitive ... [more ▼]

Satisfying the quality of service (QoS) requirements of users in the form of channel availability and service retainability within the resource limited environment has been a major problem in cognitive radio networks. In this connection, several research studies have been carried out in the literature to improve the QoS of users by proposing dynamic channel reservation algorithms. However, the studies have a number of limitations in their conceptual and mathematical modeling of channel availability and service retainability, which render their performance evaluation unreliable. In this paper, we address these limitations for leading to more realistic, reliable, and practically valid modeling. For conceptual modeling, we use connection availability in place of channel availability, motivated by the fact that the latter does not necessarily lead to a successful establishment of connection and, thus, is not a suitable performance indicator. For instance, obtaining a channel for transmission is of no avail if the intended receiver is inaccessible. Similarly, we consider service retainability with accessibility/inaccessibility of the intended receiver incorporated. For mathematical modeling, we use CTMC and the resultant closed from expressions to include all the required states of channel availability yet unsuccessful connection establishment. Additionally, we derive closed form equations for channel availability and service retainability that are in exact conformance with the CTMC model. Results confirm that considering the impact of receiver’s accessibility leads to performance difference for the channel availability and service retainability presented in the sate-of-the-art. [less ▲]

Detailed reference viewed: 22 (0 UL)
Full Text
Peer Reviewed
See detailAn in-depth investigation of the performance characteristics of Hyperledger Fabric
Guggenberger, Tobias; Sedlmeir, Johannes UL; Fridgen, Gilbert UL et al

in Computers and Industrial Engineering (2022), 173

Private permissioned blockchains are deployed in ever greater numbers to facilitate cross-organizational processes in various industries, particularly in supply chain management. One popular example of ... [more ▼]

Private permissioned blockchains are deployed in ever greater numbers to facilitate cross-organizational processes in various industries, particularly in supply chain management. One popular example of this trend is Hyperledger Fabric. Compared to public permissionless blockchains, it promises improved performance and provides certain features that address key requirements of enterprises. However, also permissioned blockchains are still not as scalable as centralized systems, and due to the scarcity of theoretical results and empirical data, their real-world performance cannot be predicted with the necessary precision. We intend to address this issue by conducting an in-depth performance analysis of Hyperledger Fabric. The paper presents a detailed compilation of various performance characteristics using an enhanced version of the Distributed Ledger Performance Scan (DLPS). Researchers and practitioners alike can use the various performance properties identified and discussed as guidelines to better configure and implement their Hyperledger Fabric network. Likewise, they are encouraged to use the DLPS framework to conduct their measurements. [less ▲]

Detailed reference viewed: 43 (7 UL)
Full Text
Peer Reviewed
See detailThe conformal group of a compact simply connected Lorentzian manifold
Melnick, Karin; Pecastaing, Vincent UL

in Journal of the American Mathematical Society (2022), 35(1), 81122

Detailed reference viewed: 138 (3 UL)
Full Text
Peer Reviewed
See detailThickness and relative hyperbolicity for graphs of multicurves
Russell, Jacob; Vokes, Kate UL

in Journal of Topology (2022), 15(4), 2317-2351

We prove that any graph of multicurves satisfying certain natural properties is either hyperbolic, relatively hyperbolic, or thick. Further, this geometric characterization is determined by the set of ... [more ▼]

We prove that any graph of multicurves satisfying certain natural properties is either hyperbolic, relatively hyperbolic, or thick. Further, this geometric characterization is determined by the set of subsurfaces that intersect every vertex of the graph. This extends previously established results for the pants graph and the separating curve graph to a broad family of graphs associated to surfaces. [less ▲]

Detailed reference viewed: 21 (3 UL)
See detailBlack hole mirages: electron lensing and Berry curvature effects in inhomogeneously tilted Weyl semimetals
Haller, Andreas UL; Hegde, Suraj; Xu, Chen et al

in arXiv (2022)

We study electronic transport in Weyl semimetals with spatially varying nodal tilt profiles. We find that the flow of electrons can be guided precisely by judiciously chosen tilt profiles. In a wide ... [more ▼]

We study electronic transport in Weyl semimetals with spatially varying nodal tilt profiles. We find that the flow of electrons can be guided precisely by judiciously chosen tilt profiles. In a wide regime of parameters, we show that electron flow is described well by semiclassical equations of motion similar to the ones governing gravitational attraction. This analogy provides a physically transparent tool for designing tiltronic devices, such as electronic lenses. The analogy to gravity circumvents the notoriously difficult full-fledged description of inhomogeneous solids, but a comparison to microscopic lattice simulations shows that it is only valid for trajectories sufficiently far from analogue black holes. We finally comment on the Berry curvature-driven transverse motion, and relate the latter to spin precession physics. [less ▲]

Detailed reference viewed: 18 (4 UL)
See detailEMPTY
Venken, Machteld UL; Sauer, Arnaud

in Empty (2022)

Detailed reference viewed: 11 (1 UL)
Full Text
Peer Reviewed
See detailUnclonable human-invisible machine vision markers leveraging the omnidirectional chiral Bragg diffraction of cholesteric spherical reflectors
Agha, Hakam UL; Geng, Yong UL; Ma, Xu UL et al

in Light: Science and Applications (2022), 11(309), 10103841377-022-01002-4

The seemingly simple step of molding a cholesteric liquid crystal into spherical shape, yielding a Cholesteric Spherical Reflector (CSR), has profound optical consequences that open a range of ... [more ▼]

The seemingly simple step of molding a cholesteric liquid crystal into spherical shape, yielding a Cholesteric Spherical Reflector (CSR), has profound optical consequences that open a range of opportunities for potentially transformative technologies. The chiral Bragg diffraction resulting from the helical self-assembly of cholesterics becomes omnidirectional in CSRs. This turns them into selective retroreflectors that are exceptionally easy to distinguish— regardless of background—by simple and low-cost machine vision, while at the same time they can be made largely imperceptible to human vision. This allows them to be distributed in human-populated environments, laid out in the form of QR-code-like markers that help robots and Augmented Reality (AR) devices to operate reliably, and to identify items in their surroundings. At the scale of individual CSRs, unpredictable features within each marker turn them into Physical Unclonable Functions (PUFs), of great value for secure authentication. Via the machines reading them, CSR markers can thus act as trustworthy yet unobtrusive links between the physical world (buildings, vehicles, packaging,...) and its digital twin computer representation. This opens opportunities to address pressing challenges in logistics and supply chain management, recycling and the circular economy, sustainable construction of the built environment, and many other fields of individual, societal and commercial importance. [less ▲]

Detailed reference viewed: 37 (6 UL)